Exam 11: Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

(Multiple Choice)
4.7/5
(34)

Decryption is the process of converting plaintext into ciphertext.

(True/False)
4.8/5
(29)

The CERT was established at Carnegie Mellon University.

(True/False)
4.9/5
(37)

What is a packet level firewall as compared to a NAT firewall and as compared to an applications layer firewall?

(Essay)
4.8/5
(42)

A hacker gaining access to organizational data files and resources is an example of an) ____________ threat.

(Multiple Choice)
4.8/5
(34)

When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.

(True/False)
4.8/5
(42)

The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.

(True/False)
4.8/5
(37)

_______________ is an encryption standard that uses a total of 168 bits as the key.

(Multiple Choice)
4.7/5
(34)

What is PKI and why is it important?

(Short Answer)
4.8/5
(44)

Secure Sockets Layer is an encryption standard designed for use on the Web.

(True/False)
4.8/5
(41)

Which of the following is not a type of intrusion prevention system?

(Multiple Choice)
5.0/5
(42)

Confidentiality is not a threat to business continuity.

(True/False)
4.9/5
(49)

To snare intruders, many organizations now use _________ techniques.

(Multiple Choice)
4.7/5
(41)

Which of the following type of media is least susceptible to eavesdropping?

(Multiple Choice)
4.8/5
(41)

Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.

(True/False)
4.9/5
(37)

A brute-force attack is a method of trying to guess the correct password by trying every possible key.

(True/False)
4.8/5
(25)

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?

(Multiple Choice)
4.8/5
(35)

A denial-of-service attack occurs when someone external blocks access to your network.

(True/False)
4.9/5
(36)

IP spoofing means to:

(Multiple Choice)
4.7/5
(29)

Which of the following is not true about one-time passwords?

(Multiple Choice)
4.7/5
(36)
Showing 41 - 60 of 127
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)